The invention relates to a system for the protection of neuroprosthesis operation against unauthorized access to the function or operating data. The system is assigned to neuroprostheses for treating functional disorders of the nervous system. This neuroimplant protection system (NIS) comprises at least one neuroprosthesis component which is in contact or operational connection with nerve tissue. Neuroprosthesis operation takes place only during the period of a specific authorization and/or comprises an authorized data transmission between external component and implanted component and/or an authorized communication for monitoring and/or defining the neuroprosthesis functional state. The communication between external and implanted component is in encrypted form.
|
1. A method for operating a neuroprosthesis in the central nervous system within the skull, the spinal cord or peripheral nerves connected to the spinal cord, or a vision prosthesis or hearing prosthesis, the neuroprosthesis comprising an implanted internal component and a non-implanted external component, a wireless data transmission being provided between the internal component and the external component, wherein some or all of the data are transmitted only of an authorization signal transmitted by the external component to the internal component has been tested and accepted and the authorization signal~is automatically changed at non-periodic time intervals.
14. A method for operating a neuroprosthesis in the central nervous system inside the skull, the spinal cord or peripheral nerves connected to the spinal cord, or a vision prosthesis or hearing prosthesis, the neuroprosthesis comprising an implanted internal component and a non-implanted external component, the internal component furthermore being in contact or operative connection with the nerve tissue and being able to monitor, influence or replace a function of the nerve tissue during operation, wherein the internal component is operated only if an authorization signal transmitted by the external component to the internal component has been tested and accepted and the authorization signal is automatically changed at non-periodic time intervals.
17. A method for operating a neuroprosthesis in the central nervous system inside the skull, the spinal cord or peripheral nerves connected to the spinal cord, or a vision prosthesis or hearing prosthesis, the neuroprosthesis comprising an implanted internal component and a non-implanted external component, the internal component furthermore being in contact or operative connection with the nerve tissue and being able to monitor, influence or replace a function of the nerve tissue during operation, wherein the internal component is operated only if an authorization signal transmitted by the external component to the internal component has been tested and accepted and wherein the acceptance of the authorization signal is dependent on the internal component detecting an unusual state of an implant wearer.
2. The method according to
3. The method according to
4. The method according to
5. The method according to
6. The method according to 1 wherein for the data transmission or functioning of the internal component, at least two operating states are possible that can be activated by means of different authorization signals.
7. The method according to
8. The method according to
9. The method according to
11. The method according to
12. The method according to
13. The method according to
15. The method according to clam 14 wherein the authorization signal accepted by the internal component is part of a data stream that is transmitted from the external component to the internal component, the data stream being encrypted using sets of public and private keys, the public and private keys being automatically changed at random time intervals.
16. The method according to
18. The method according to
|
The invention relates to a method for the operation of a neuroprosthesis and to a device therefor.
In the context of the present patent application, neuroprostheses are understood as meaning devices for use in contact or active connection (unidirectional or bidirectional influencing through release of active ingredients) with the central nervous system inside the skull, the spinal cord (or peripheral nerves connected to the spinal cord) and also optical prostheses or hearing prostheses with an implanted internal component and a non-implanted external component.
Several known neuroprostheses for the treatment of inter alia functional disorders of the vision system, the hearing system, the intracranial nerve system, the vegetative nerve system, the spinal cord or the peripheral nervous system have an implanted component in contact with nerve tissue in which data transmission is provided between an external and the internal implanted component for the purposes of operation, of functional monitoring or of function determination (see for example WO 98/36793, WO 98/36795 and U.S. Pat. No. 6,002,996).
Several systems have been disclosed for protected data transmission between mutually remote components by inter alia mobile radio, satellite communication or in local computer networks or the Internet in for example telebanking, private car theft protection or telesurgery (see for example DE 2618401, U.S. Pat. No. 5,646,456, U.S. Pat. No. 5,734,330, U.S. Pat. No. 5,940,515, U.S. Pat. No. 5,930,362, U.S. Pat. No. 5,963,621, U.S. Pat. No. 5,940,799, DE 19630920 and EP 0946018).
Known implants for inter alia personal identification or animal tracking location are in signal connection with an external component without contact to nerve tissue (see for example U.S. Pat. No. 4,399,821, U.S. Pat. No. 4,909,250, U.S. Pat. No. 5,855,609, WO 97/00708, EP 0896828 A2 and WO 98/29160).
Implants as heart pacemakers whose operating state can be checked and/or altered by means of an external component are known (see for example in U.S. Pat. No. 4,361,153, DE 2944542, U.S. Pat. No. 5,871,451 and U.S. Pat. No. 5,891,178).
There are known encrypting and decrypting devices and methods for avoiding unauthorized access to digital or analogue data transmissions inter alia in industrial or medical-engineering fields of application (see for example U.S. Pat. No. 4,766,516, U.S. Pat. No. 5,365,225, U.S. Pat. No. 5,696,825, U.S. Pat. No. 5,987,440 and WO 98/10836).
Available neuroprostheses or neuroimplants (eg a cochlear implant for deaf people or a retina implant with learning capability for blind people with retina degeneration) do not have an access control that makes access to data and operation dependent on a specific authorization. In principle, the external components specially adjusted for a given implant wearer can be exchanged or mixed up and thus result in appreciable and possibly harmful functional disturbances in the industrial and/or biomedical field.
Furthermore, personal data requiring protection and/or implant data can be retrieved and/or altered without authorization to the detriment of the implant wearer and/or of the implant producer/operator.
A communication connection between the implanted component permanently connected to the implant wearer and an essentially exchangeable external component is typically set up for neuroprosthesis operation without prior attention having been paid to protection against unauthorized data access, etc. Therefore the basic risk of misuse or of an unintenional incorrect operation is significant.
It is therefore an object of the present invention to eliminate these disadvantages and to disclose a neuroimplant protection system (NIS) that prevents unauthorized access.
Thus viewed from one aspect the present invention provides a method for operating a neuroprosthesis in the central nervous system within the skull, the spinal cord or peripheral nerves connected to the spinal cord, or a vision prosthesis or hearing prosthesis, the neuroprosthesis comprising an implanted internal component and a non-implanted external component, a wireless data transmission being provided between the internal component and the external component, wherein some or all of the data are transmitted only if an authorization signal transmitted by the external component to the internal component has been tested and accepted. Because data transfer or operation of the neuroprosthesis can take place only after authorization with the aid of the implanted component, numerous conceivable types of operational misuse may be prevented.
The preferred embodiments of the authorization procedure are based on essential functional features of the implanted component that cannot be discovered, copied or simulated in the implanted state.
Since the authorization procedure requires the interaction of the implanted component with the external component, data stored in protected form in the internal, the external and (optionally) a further internal component can include not only data for the purpose of the neuroprosthesis but also (for example) economically or legally important personal data.
The construction and authorization system of a neuroprosthesis designed in this way prevents the copying of the individual components.
The neuroimplant protection system (NIS) of the invention provides a neuroprostheses expanded or additionally equipped with a number of important advantages over known neuroprostheses without NIS. This substantially increases the operational security and the acceptance of neuroprostheses in relation to inter alia data protection and protection against operating faults. For the first time, the present invention provides a system that prevents operational misuse by coupling the implanted component to external components not specifically assigned. This ensures for the first time that the implant wearer is protected against functional injury owing to the use of wrong components.
The present invention makes it possible for the first time to prevent unauthorized access to data and function determination of the implanted components for neuroprostheses equipped with NIS.
Furthermore the present invention makes it possible for the first time to prevent unauthorized access to data transmission between external and implanted components. As a result, the personal data protection of the implant wearer (which in the case of conventional treatment methods is protected by inter alia the attendant doctor's duty of confidentiality) is secured permanently for the first time in relation to the neuroprosthesis operation.
In addition, the present invention can prevent the unauthorized access to important functional properties of the neuroprosthesis. This prevents the unauthorized imitation (reverse engineering) of components of the neuroprostheses because (on the one hand) important functional properties are lacking for the unauthorized imitation and (on the other hand) such unauthorized imitation components cannot be operated with the remaining components because of lack of compatibility and lack of authorization of the component communication.
Exemplary advantageous embodiments of the neuroimplant protection system (NIS) and of the associated methods are discussed below with reference to the drawings.
The operation of the neuroprosthesis or the authorized access to internally or externally stored data is only possible if an authorization signal arriving at the internal component from the external component is legitimized by a method which is based solely on features of the internal component and cannot be analysed, altered or circumvented by any external component.
In an advantageous embodiment of the method for the protected operation of a neuroprosthesis (see
In a further advantageous method for protected operation embodies, the internal implanted component has (in addition to a periodic timer) a non-periodic timer that divides the time in accordance with a fixed code and requires a copy of this time-code timer in the external component for the purpose of authorization. For this purpose, an algorithm for generating mutually identical, non-periodic temporal sequences is defined during the production or alignment of external and implanted internal components in the two components. Furthermore, in this preferred embodiment, the synchronism of the two non-periodic timers is ensured (for example) by agreed synchronization signals. Consequently unauthorized attempts to gain access to data or operate the neuroprosthesis (which are typically based on periodic timers) can be very rapidly detected and rejected.
In a further advantageous embodiment of the method for protected operation, (depending on definition) in the event of rejection of the authorization attempt, the internal component can either emit a rejection signal or behave passively and thus keep its existence and (optionally) precise localization secret.
In a further advantageous embodiment of the method for protected operation, (depending on definition) the acceptance of an authorization can be variably converted in the neuroprosthesis by: a) automatic start of operation or data transmission without a separate acceptance signal, b) generation of a signal that is transmitted by the internal component and that can also be detected by suitable, externally positioned sensors without access to the corresponding code and c) adjustment of a passive property of the internal component (for example the switching-on of an internal energy receiver, of an oscillatory circuit or of absorption or reflection structures) that is measurable externally (for example through increased energy drain) by the specially authorized component which transmits (for example) in the authorized code so that it cannot be discovered by foreign external detectors.
In a further advantageous embodiment of the method for protected operation, to avoid operational misuse an internal component is always assigned only to precisely one external component and vice versa. This unambiguous exclusive assignment is achieved in such a way that it cannot be disabled by access monitoring mechanisms current in data processing by means of "superuser" rights (for example) of the implant operator or producer or through knowledge of a password. For example, the replacement of a specific external component originally assigned to the internal component can take place only through the express agreement of the implant wearer by way of agreement to a medical intervention. For this advantageous purpose, a functional real-time model of the specific external component can be produced only during authorized operation. Alternatively during manufacture or initial alignment of an external and internal component, a duplicate of the external component can be produced such that is securely safeguarded so that only the implant wearer can have access to the "copy" as a model or duplicate of the module for authorization and data exchange of the external component.
In a further advantageous embodiment of the method for protected operation, the attainment of authorized access to data transmission and/or internal component is not possible outside the authorized operation by a functional analysis of the specific external component or the functional real-time model assigned to it. This advantageous property is achieved inter alia in that the properties detectable in the external component during the analytical operation do not give adequate information about the coding or encrypting necessary for the successful authorization and decoding or decrypting of the authorization signal. For this purpose, the authorization is preferably configured in such a way that a multidimensional "template match" comprising (for example) the dimensions of time, amplitude, frequency and position which was defined in the manufacture of one internal component in each case and the associated external component in a random process or with the aid of neuronal networks or other learning algorithms or using features specific only to the implant wearer (such as (for example) iris of the eye, fingerprint, inherited material) forms a non-interchangeable "key-lock" pair. In this context, in a functional and structural analysis of the external component, neither the external "key" nor the associated internal "lock" can be determined at reasonable expense. The large number of possible combinations is such that the prescribed number of futile authorization attempts is very rapidly reached and the internal component permanently disabled.
In a further advantageous embodiment of the method for protected operation, for the production or the initial alignment or functional definition of an external and an internal component (and optionally a duplicate to be securely safeguarded of the external component in relation to the coding elements), pairs of the associated memories or/and processor and/or FPGA units are in each case processed by identical software and/or hardware definitions. For example, the corresponding pair of programmable microelectronic units (for example, FPGA) can be programmed taking into account its physical and geometrical properties by an identical program or can be produced by mechanical manufacturing steps, as a result of which (for example) the non-periodic timer or the definition of the family of authorization signals used only for said pair is defined unambiguously, confidentially and in a protected manner (namely embedded in the microelectronics). However, owing to the function sequences differently defined in the external and the internal component and additional functions, these identical function definitions do not bring about identical overall functions, but precisely complementary functions unambiguously matching one another. These may be function definitions that can be repeated or not repeated by the producer. As a result, pairs are produced that can communicate or exchange signals only with one another but not with other components.
In a further advantageous embodiment of the method for protected operation, access to protected data or functional states both in the internal component and in the external component is made (or can be made) dependent on the successful authorization. For this purpose, in a preferred embodiment, an authorization attempt legitimized in the internal component is also registered in the external component and used therein not only to unblock the data transmission but also to unblock the access to data or functional states available in protected form in the external component.
In a further advantageous embodiment of the method for protected operation, the selected authorization signal is (for example) a signal pattern that is defined by amplitude, frequency, time and position parameters. Every external component has as an authorization signal its unambiguous identification as authorization key. Every internal component has in turn another authorization signal as authorization lock. Knowledge of the key or of the lock alone does not permit conclusions to be drawn about the other signal needed in each case for authorization. Data transmission and/or neuroprostheses operation can be started only when the correct authorization signal is received as a key in the internal component and is successfully compared with the authorization signal in the latter available as a lock using a memory and/or a processor and/or an FPGA so that the key and lock jointly result in an authorization decision.
For the abovementioned purpose, in a preferred embodiment a type of `dynamic labyrinth` (
In a preferred embodiment, the correct traversal of the `labyrinth` generates in turn a temporal signal pattern that is conveyed in a microelectronically defined form to a logic gate structure and is interpreted as "yes=authorization can take place". Neither the structure and function of the labyrinth nor the gate function or structure that is coupled-on along the labyrinth and that is completely assigned to the implanted internal component can be rendered transparent, copied or simulated by interference on the part of the external component.
In a further advantageous embodiment of the method for protected operation, the `dynamic labyrinth` is represented preferably by a sequence of instructions or digital states of which some are observed continuously as coupling points (see
In a preferred embodiment, the labyrinth (which can be implemented as an algorithm in accordance with the prior art for example in an FPGA, memory and/or processor) functionally comprises a number of paths with bifurcations, direction definitions and gates that change as a function of time. A typical attempt to traverse the labyrinth successfully comprises the division of the signal into individual signal elements that are started at different points in the labyrinth and whose time variation has to match the time variation of the particular labyrinth path precisely. only if the signal elements change in a way that precisely matches the labyrinth path (for example in relation to speed and direction of movement) can the required test signals occur at the defined coupling points at the required times. In this preferred embodiment, it is the case that the authorization is carried out only if the signal received from the external component reaches (as authorization signal and consequently as a key on the basis of the specifically defined labyrinth traversal) the coupling points at the prescribed times with the value agreed in each case for the authorization and is detected at said points (for example) by a switching network or switching mechanism (preferably comprising logic units or functions including time delay elements and connecting lines to the individual coupling points) and the output signals of the individual switching network elements (see
In a preferred embodiment of the method for protected operation, the completion of the authorization for preventing an unauthorized completion signal at the external component (false signal) is not explicitly signalled to the external component but is achieved only implicitly by the operational start-up of the internal component detectable by the external component. As an alternative to this, the completion can be signalled in each case by a signal from the internal to the external component, which signal can be used only once and (although capable of correct interpretation in the external component) is not explicitly stored.
In a further advantageous embodiment of the method for protected operation, the authorization is altered during operation. This is preferably done so that (even during the definition of the authorization key and lock in connection with the manufacture of external and internal components) the change in the key and/or the lock is prepared (for example) after every successful authorization in the external or the internal component and correspondingly takes place automatically.
In a further advantageous embodiment of the method for protected operation, personal and confidential medical data (such as for example the nature and intended operating mechanism of the neuroprosthesis, the quantity, type or time variation of the therapeutic and/or diagnostic measures) stored in an implanted component are protected by a separate access security arrangement.
In a further advantageous embodiment of the method for protected operation, in the event of an operating fault or other type of emergency, the internal components can be switched off or functionally shut down or switched over to a prepared emergency program using a separate technical method and/or microelectronic device. This method for accessing subfunctions of the internal component preferably uses a magnetostatic principle (that is to say for example the movement of a lever belonging to the internal component with a ferromagnetic component), an inductive principle (that is to say inductive intervention in the internal component), a sound engineering principle (that is to say the interference with a switching mechanism in the internal component by sound signals), a mechanical principle (that is to say for example the excitation of mechanical pressure, suction, movement or vibration detectors in the internal component) or the application of other known physical or chemical principles in order to reach corresponding detectors in the internal component.
In a further advantageous embodiment of the method for protected operation, an inhibit that has previously occurred (see above) is cancelled with the aid of an authentication for which a further key is implemented in the software and/or the hardware of the component during the production of the component (or with the aid of a method mentioned in a previous paragraph).
In a further advantageous embodiment of the method for protected operation, the encrypting of the data exchanged between an external and an internal component (including the authorization signal) changes at not necessarily periodic intervals. Provision is preferably made that the data encrypting and associated decrypting is fixed before the start of the authorization. Furthermore, provision is preferably made that the data encrypting after authorization has taken place changes as a function of the authorization signal last used in a manner defined during manufacture of the lock and key.
The data transmission is encrypted in this advantageous embodiment with the aid of an algorithm for the encrypting and decrypting of data on the basis of public and private keys. Every external and every implanted component of the neuroprosthesis operates a set of keys comprising a private key that is known only inside the respective component and a public key that is additionally known inside the other components. During the production of the components, they are each equipped with a public and a private initial key and also with the public initial keys of the other components. Each component automatically replaces its own set of keys at random time intervals in the order of magnitude of a few seconds. Each component passes the public key to the other components in encrypted form as soon as it has been changed. For the purpose of encrypting the data, each component has electronic conductors, a memory and a processor that jointly represent the implementation of the encrypting algorithm. The data are encrypted in such a way that the encrypting algorithm generates new data from the data, the private key of the transmitting component and from the public key of the component to which the data are to be transmitted. Said data are transmitted and decrypted by the receiving component by means of the public key of the transmitting component and of the private key of the receiving component. The decrypting algorithm is designed so that received data that have been encrypted with keys other than those provided above are ignored by the receiving component.
In a further advantageous embodiment of the method for protected operation, the encrypted communication is constructed on the principle of an encrypting system having a public and a private key. The transmitter of a message (internal or external component) encrypts the message with the private key that is known only in the transmitting component and that is set microelectronically and/or by software during the production of the component. The receiver of said message decrypts it on the basis of the information of the component from which it was sent and with the public key of the transmitting component that was set microelectronically and/or by software during the production of the components. No technical device for reading out the set key is implemented either in the external or in the internal component.
In a further advantageous embodiment of the method for protected operation, an authentication is used to unblock the internal and the external components. In this connection, the software and/or hardware of the components is decrypted or initialized with the aid of unblocking keys. The unblocking is possible only if all the components predefined during the production of the components are present and are communicating with one another. No technical device for the unencrypted reading-out of the set unblocking key is implemented either in the external or in the internal component.
In a further advantageous embodiment of the method for protected operation, in order to avoid copying of the software, the software components of the external and/or internal components are stored in encrypted form during the production. To operate an internal and/or external component, a decryption program is first started that obtains the unblocking key from all the other internal and/or external components through the encrypted channel and decrypts the main program of the component. If at least one key is incorrectly received, the main program is incorrectly decrypted and thereby becomes functionally unusable.
In a further advantageous embodiment of the method for protected operation, the authentication proceeds in a predetermined sequence (for example the unblocking keys from internal components are first read out via the encrypted channel and the software of the external components is decrypted therewith and their hardware component initialized). Alternatively, this takes place on the basis of a stochastic principle.
In a further advantageous embodiment of the method for protected operation, the unblocking key is prepared on the basis of biometric features (for example iris, fingerprint, voice, genetic imprint, brainwaves, bioelectric properties of the tissues) of the implant wearer. This prevents unauthorized operation of the neuroprosthesis in the absence of the implant wearer.
In a further advantageous embodiment of the method for protected operation, an authorization of every component takes place permanently or repeatedly during operation after the authentication and serves to detect possible attacks. The authorization takes place by means of an authorization key. Every internal and external component comprises its own authorization key that is prepared either stochastically and/or on the basis of producer data and/or biometric data of the implant wearer and is set microelectronically and/or by software during the production of the component.
In a further advantageous embodiment of the method for protected operation, a distinction is made between two types of NIS operation: regulated operation and autonomous operation. During regulated operation, communication takes place between the implant wearer and a PC or between the doctor and a PC or between another legitimized person and the PC. Every individual is assigned a unique password that (together with the authorization keys of the internal and/or external components) defines the entitlement to operate the neuroprosthesis. The passwords are subject to the duty of confidentiality.
In a further advantageous embodiment of the method for protected operation, the regulated operation of the neuroprosthesis takes place only after the implant wearer has been put into a psychic and/or physiological state that is unusual for the autonomous operation of the neuroprosthesis and that can be identified with existing electromagnetic or electrochemical or optical or thermal or mechanical sensors. For example, the sleeping state can be identified by means of detecting alpha and beta brainwaves, an increased pH can be measured with a pH sensor, an increased or reduced body temperature (for example) by means of temperature measurement and increased blood circulation in the skin (for example) by means of optical sensors.
In a further advantageous embodiment of the method for protected operation, an authorization takes place according to a state pattern in autonomous operation. The state pattern is defined by authorization keys and/or internal signals and/or states of the internal and/or external components (for example in the case of a neuroprosthesis, the stimulation signals and/or states of the spatial and/or temporal filters are used to describe the state pattern). The internal signals and states unambiguously identify the implant wearer and do not occur in any other neuroprosthesis in the combination of the state pattern.
In a further advantageous embodiment of the method for protected operation, the internal component and/or the external component triggers separate signals both in the case of undesirable functions (such as an incorrect function of the neuroprosthesis, an attempted operational misuse and/or an attempt to access data or a function of the neuroprosthesis (such an attempt not being envisaged for the authorized operation)) and in the case of particular authorized functions (such as for example the scanning of personal data in an internal component). In a preferred embodiment, this alarm signal in the one case or status symbol in the other case is brought to the attention of the implant wearer alone (for example by a triggering sensation that can be detected by means of mechanoreceptors).
Becker, Michael, Eckmiller, Rolf, Hünermann, Ralph, Ortmann, Valerij
Patent | Priority | Assignee | Title |
10293168, | Jun 10 2005 | Medtronic Urinary Solutions, Inc. | Systems and methods for clinician control of stimulation systems |
10322287, | Sep 07 2006 | Medtronic Urinary Solutions, Inc. | Systems and methods for patient control of stimulation systems |
10434320, | Jun 10 2005 | Medtronic Urinary Solutions, Inc. | Implantable pulse generator systems and methods for providing functional and/or therapeutic stimulation of muscles and/or nerves and/or central nervous system tissue |
7321796, | May 01 2003 | DOHENY EYE INSTITUTE | Method and system for training a visual prosthesis |
7475245, | Mar 15 2004 | Cardiac Pacemakers, Inc | System and method for providing secure exchange of sensitive information with an implantable medical device |
7565197, | Jun 18 2004 | Medtronic INC | Conditional requirements for remote medical device programming |
7761167, | Jun 10 2004 | MEDTRONIC URINARY SOLUTIONS, INC | Systems and methods for clinician control of stimulation systems |
7813809, | Jun 10 2004 | MEDTRONIC URINARY SOLUTIONS, INC | Implantable pulse generator for providing functional and/or therapeutic stimulation of muscles and/or nerves and/or central nervous system tissue |
7873420, | Jun 13 2006 | MED-EL Elektromedizinische Gerate GmbH | Password protection for cochlear implant |
7955258, | Apr 22 2005 | Cardiac Pacemakers, Inc. | External data processing device to interface with an ambulatory repeater and method thereof |
7967751, | Apr 22 2005 | Cardiac Pacemakers, Inc. | Ambulatory repeater for use in automated patient care |
8126736, | Jan 23 2009 | Warsaw Orthopedic, Inc. | Methods and systems for diagnosing, treating, or tracking spinal disorders |
8165692, | Jun 10 2004 | MEDTRONIC URINARY SOLUTIONS, INC | Implantable pulse generator power management |
8195304, | Jun 10 2004 | MEDTRONIC URINARY SOLUTIONS, INC | Implantable systems and methods for acquisition and processing of electrical signals |
8216135, | Apr 22 2005 | Cardiac Pacemakers, Inc. | Ambulatory repeater for use in automated patient care |
8260428, | May 01 2003 | California Institute of Technology | Method and system for training a visual prosthesis |
8327139, | Mar 15 2004 | Cardiac Pacemakers, Inc. | System and method for securely exchanging sensitive information with an implantable medical device |
8331563, | Mar 15 2004 | Cardiac Pacemakers, Inc. | System and method for providing secure communication of sensitive information |
8467875, | Feb 12 2004 | MEDTRONIC URINARY SOLUTIONS, INC | Stimulation of dorsal genital nerves to treat urologic dysfunctions |
8516568, | Jun 17 2011 | TRACE-WILCO, INC | Neural network data filtering and monitoring systems and methods |
8685093, | Jan 23 2009 | Warsaw Orthopedic, Inc. | Methods and systems for diagnosing, treating, or tracking spinal disorders |
8706252, | Jun 10 2004 | Medtronic, Inc. | Systems and methods for clinician control of stimulation system |
9205255, | Jun 10 2004 | MEDTRONIC URINARY SOLUTIONS, INC | Implantable pulse generator systems and methods for providing functional and/or therapeutic stimulation of muscles and/or nerves and/or central nervous system tissue |
9216294, | Jun 10 2004 | Medtronic Urinary Solutions, Inc. | Systems and methods for clinician control of stimulation systems |
9308382, | Jun 10 2004 | MEDTRONIC URINARY SOLUTIONS, INC | Implantable pulse generator systems and methods for providing functional and/or therapeutic stimulation of muscles and/or nerves and/or central nervous system tissue |
9480846, | May 17 2006 | MEDTRONIC URINARY SOLUTIONS, INC | Systems and methods for patient control of stimulation systems |
9686306, | Nov 02 2012 | University of Washington Through Its Center for Commercialization | Using supplemental encrypted signals to mitigate man-in-the-middle attacks on teleoperated systems |
9724526, | Jun 10 2004 | Medtronic Urinary Solutions, Inc. | Implantable pulse generator systems and methods for operating the same |
Patent | Priority | Assignee | Title |
4305397, | Nov 06 1978 | Medtronic, Inc. | Pacing generator programmer with transmission checking circuit |
4361153, | May 27 1980 | Pacesetter, Inc | Implant telemetry system |
4399821, | Feb 19 1981 | Free moving animal physiological monitoring and identification system and method | |
4401120, | Nov 06 1978 | Medtronic, Inc. | Digital cardiac pacemaker with program acceptance indicator |
4613937, | Feb 22 1984 | Pacesetter, Inc | Method for externally programming a device implanted in a patient |
4766516, | Sep 24 1987 | Hughes Electronics Corporation | Method and apparatus for securing integrated circuits from unauthorized copying and use |
4909250, | Nov 14 1988 | Implant system for animal identification | |
5365225, | May 18 1989 | Siemens Aktiengesellschaft | Transmitter-receiver system with (re-)initialization |
5456692, | Sep 03 1993 | Pacesetter, Inc | System and method for noninvasively altering the function of an implanted pacemaker |
5646456, | Dec 27 1993 | Nissan Motor Co., Ltd. | Anti-theft car protection system |
5696825, | Feb 13 1995 | CYPHERCOMM, INC | Personal access management system |
5734330, | Oct 11 1994 | Calsonic Corporation | Anti-theft car protection device |
5855609, | Aug 24 1992 | Allergan, Inc | Medical information transponder implant and tracking system |
5871451, | Mar 31 1993 | Draeger Medical Systems, Inc | Apparatus and method for providing dual output signals in a telemetry transmitter |
5891178, | May 13 1997 | Pacesetter, Inc | Programmer system and associated methods for rapidly evaluating and programming an implanted cardiac device |
5930362, | Oct 09 1996 | AT&T MOBILITY II LLC | Generation of encryption key |
5940515, | Aug 13 1996 | Intellectual Ventures I LLC | Secure dialing in mobile telephone system |
5940799, | Sep 15 1997 | Google Technology Holdings LLC | System and method for securing speech transactions |
5963621, | May 24 1993 | Comsat Corporation | Secure communication system |
5987440, | Jul 22 1996 | CYVA RESEARCH HOLDINGS, LLC | Personal information security and exchange tool |
6002996, | Nov 26 1997 | Johns Hopkins University, The | Networked sensor system |
6241704, | Nov 22 1901 | SMITHS MEDICAL ASD, INC | Drug pump systems and methods |
EP896828, | |||
EP946018, | |||
WO9700708, | |||
WO9810836, | |||
WO9829160, | |||
WO9836793, | |||
WO9836795, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jun 26 2000 | ECKMILLER, ROLF | Intelligent Implants GmbH | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011038 | /0491 | |
Jul 03 2000 | ORTMANN, VALERIJ | Intelligent Implants GmbH | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011038 | /0491 | |
Jul 03 2000 | BECKER, MICHAEL | Intelligent Implants GmbH | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011038 | /0491 | |
Jul 03 2000 | HUNERMANN, RALPH | Intelligent Implants GmbH | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011038 | /0491 | |
Aug 09 2000 | Intelligent Implants GmbH | (assignment on the face of the patent) | / | |||
Jan 02 2003 | Intelligent Implants GmbH | IIP-TECHNOLOGIES GMBH | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 013740 | /0288 | |
Feb 12 2004 | IIP Technologies GmbH | INTELLIGENT ACQUISITION, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015000 | /0914 | |
Oct 25 2006 | Intelligent Acquisition LLC | IMI Intelligent Medical Implants AG | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 020196 | /0009 | |
Nov 06 2013 | IMI Intelligent Medical Implants AG | PIXIUM VISION SA | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 031719 | /0914 |
Date | Maintenance Fee Events |
Feb 23 2006 | M2551: Payment of Maintenance Fee, 4th Yr, Small Entity. |
May 27 2010 | M2552: Payment of Maintenance Fee, 8th Yr, Small Entity. |
Jun 03 2014 | M2553: Payment of Maintenance Fee, 12th Yr, Small Entity. |
Date | Maintenance Schedule |
Dec 10 2005 | 4 years fee payment window open |
Jun 10 2006 | 6 months grace period start (w surcharge) |
Dec 10 2006 | patent expiry (for year 4) |
Dec 10 2008 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 10 2009 | 8 years fee payment window open |
Jun 10 2010 | 6 months grace period start (w surcharge) |
Dec 10 2010 | patent expiry (for year 8) |
Dec 10 2012 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 10 2013 | 12 years fee payment window open |
Jun 10 2014 | 6 months grace period start (w surcharge) |
Dec 10 2014 | patent expiry (for year 12) |
Dec 10 2016 | 2 years to revive unintentionally abandoned end. (for year 12) |